"Ishing" for Trouble
Physical Security
Cybersecurity 101
The Human Element
Cyber Oddities
100

A form of social engineering that uses email

What is Phishing

100

When someone walks into a secured space behind you without badging in

What is Tailgating

100

The process of converting data into unreadable code to prevent unauthorized access

What is encryption?

100

The practice of manipulating people into divulging confidential information

What is social engineering?

100

This "Generation" is most vulnerable to cyber-attacks

What are Millennials?

200

A form of social engineering that uses text messaging

What is Smishing

200

Best place to go in your office during an earthquake

What is under a desk? (Doorways are no longer recommended in the office - at home it's OK)

200

A network of computers that have been infected with malware and are controlled by a single entity

What is a Botnet?

200

This weakest link in cybersecurity is often exploited by attackers

What are humans?

200

85% of people posting this type of photo online are trying to scam you

What are puppy photos?

300
Social engineering that targets a specific individual

What is Spear Phishing

300

Device anyone can use to help the victim of a heart attack

What is an AED or Automated External Defibrillator?

300

Most hackers are after this

What is money?

300

A video, image, or recording in which a persons face, image, or voice has been digitally altered so they appear to be someone else

What is a Deep Fake?

300

In 2011, MI6 took down bomb-making instructions from an online al-Qaeda magazine and replaced them with this

What are cupcake recipes?

400

Social engineering that targets executives

What is Whaling or Whale Phishing

400

The presence of this device alone can deter potential criminals

What is a camera?

400

This type of malware encrypts files and demands payment for their release

What is ransomware?

400

Someone secretly looks over your shoulder to see your PIN, password, or other sensitive information

What is shoulder surfing or screen snooping?

400

Hackers disabled computer systems at Düsseldorf University Hospital, leading to the first reported case of this

What is loss of life from a cyber-attack?

500

A form of social engineering where attackers use phone calls or voice messages to trick victims into revealing sensitive information

What is Vishing?

500

These systems regulate who can enter or exit a building often using keycards or biometric data to grant access

What are Access Control Systems (will also accept Badge Readers)

500

Compromising a smaller, less secure vendor to get to a larger company

What is a Supply Chain Attack?

500

This principle makes sure that employees only have access to data and systems necessary for their role

What is the Principle of Least Privilege (PoLP)?

500

Something fishy happened in Las Vegas when hackers accessed a casino's high-roller database through this

What is a smart fish tank?

M
e
n
u